2001 B.Sc. in Computer Science/ Ibn-Al-Haitham Education College/University of Baghdad/Baghdad/Iraq. 2005 M.Sc. in Computer Science/ College of Science/University of Baghdad/ Baghdad/Iraq. 2019 Ph.D. in Computer Science/ University of Plymouth /Plymouth/United Kingdom.
Baghdad University/College of Education/ Ibn Al-Haitham/Baghdad/ IRAQ. AUGUST 2001- APRIL 2015 (ACADEMIC LECTURER) Ph.D. student at Plymouth University/United Kingdom.
Baghdad University/College of Education/ Ibn Al-Haitham/Baghdad/ IRAQ. APRIL 2015- OCT.2019
JAN. 2020 – TILL NOW (ACADEMIC LECTURER)
- Digital Forensics.
- Multimedia Forensics Analysis
- Image processing.
- Image based retrieval.
- Information security.
- DataBases
Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreOne of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More